Part 5. Going reactive
With the gravitation of the software industry toward more responsive and efficient applications, reactive programming has emerged as a compelling paradigm. In this part of the book, you’ll be guided through the nuances of implementing security within reactive applications, balancing responsiveness with robust protection.
Chapter 17 discusses the concept of reactive apps, laying the foundation for understanding their distinctive nature. The chapter will lead you through user management intricacies in a reactive environment, elaborating on configuring precise authorization rules, both at the endpoint layer and through method security. Furthermore, you’ll gain insight into crafting a reactive OAuth 2 resource server, combining the best of both the reactive and security worlds.
By the culmination of this part, you’ll be equipped to incorporate security seamlessly into your reactive applications, ensuring they remain agile without compromising user protection.